The book is a collection of best selected research papers presented at the International Conference on Advances in Information Communication Technology and Computing …
This research focuses on message classification, specifically distinguishing between legitimate and spam messages. The paper emphasizes the importance of preprocessing …
This research focuses on message classification, specifically distinguishing between legitimate and spam messages. The paper emphasizes the impor-tance of preprocessing …
R Forgáč, M Očkay, M Javurek - 2021 Communication and …, 2021 - ieeexplore.ieee.org
The paper is focused on the proposed model of image authentication. The model is based on the steganography principle using a neural network, symmetric encryption and …
Due to the growing population of patients, in accordance to the general population growth rate, it remains imperative that healthcare deliveries are not only timely but also of high …
The strength of the encryption system depends on the power of the key generator that produces a pseudorandom stream. The generator generates a pseudorandom sequence so …
IS Seger, IM Hayder, HA Younis, HAK Younis - Webology, 2022 - webology.org
In recent years, the chess game has begun to develop successful programming solutions. Computers were programmed to play chess in the middle of the twentieth century. Computer …
This research presents a new approach in modeling and implementing a framework for linear image change detection using Field Programmable Gate Arrays (FPGA) based …